We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 9
Of your
| te tages 8 _uodely of threat
24 TE SEIS Hert from entering or _gprendigg on on noe
vork Security,
Tei any acty deal to
__ | __Effective network —Seewilly vamages acces to tht nttoork-
Nebdovts Security Combines rutfpbe Layirs af deporses ot te
edge fa fa Network»
pices and Controls + Aatoriced L4en Qain Quct to
cs
AUWOYK YeACWIUA , but Malicious actors Qu blocked
feo caring out exploits and threats -
Digitization has transformed ow world - How We Live
work, play ord Learn have cll changed : Blew Orgenizaty
phar Wd) to deter tre cowlus that astoner and
enployes derand must protect its netdork- Networks
Sewusiltg abbo helps yeu protect proprietary, infortatton
fron astnrek s “[ynimately HF proteots Your repulsion
Types Network Seowtity 3—
|_Fivewnts 2 Hr pub up a bandon hw your fruted
internal networs, ancl untrusted outside
Network.» Such Os tH Tatennet« Wy wae acetal defined
Teacher's Signature sass
Goh nenaorr Seouity fogs | mplonerds |sxperiment NO
Date
objective |
| uly +: teal oH
Eo ane ays qu au hi -nwonber_ ong “threat wy -
_Veetor Seturity breach Pittackor, use
| personal Information and —_Locial Cegineering tactles to build
oe earipatgrs “fo_deceve veciplents and
hem jo cide (aie on wane
3) T
Arti Virus and Antl-makden Sofrdou s- Maludare Short fr
Naliclous Sattar
tnoludes vires , weress, Trefand » Renkomdort _, and Spydore
Sometines malDere wil tnfect—a nitwon< but Ve
dloretent™ fr ley or ever ierka.
yy Networe Segrentation s— Sofrderu defined seg nie nation
nasoork traffic Mo cifferen
clarsifieation are based on fe endpolt Hlertitys Not Mer
IP cx clelvessed
Y Acces Gntrolg- Not evew vse 2 fetus and netJork-
deb Securify $A Web Ceurtity soln colt contro yout StF
“WE b Use) block web-based frrcods and
deny acca to Habicioud Websited + Pett protec youre
we. got ane Site om 6A tHe Chouol +
Wirelems Seourity s- Wireleas nebords QU not 24 seat
C4 wire on. Without Stiggert
Geowwity Measwua 1 ingtalung a otrebess Laat Can be
KL pss) Eronet _ ports ewer shou, Incbacing Ki
De esiisee cease eee Teacher's Signature sssseresneeensan aie f0,9ein waubrisel decors fo cn vs
nesunth with Me pbjetve of creabey dete om perfor
ey Sr c= SEA Ee coc fea
enor’, Laks
‘| Pomsive 8 Alitackers som _qccons fo Networs and Can Monitor
a Ma
FY or Steal senate Infomation, but withouk MAKING
any chang +b te dase, heawiag IF iotact *
Actves- Attackers Nor anty gain unautheized exces ut alo
Nodify cata, ether cleleting encrypts or ofhemolse
hasining TH
We distinguish _attdors Qacks from Savral oun types
CUtas 8—
+
Senveds of ent pots, typically Contpro ssiciag
At with Malwant+
sfart_by Inpeng Rent
Endpoint Attachs 8 Gasnin unauthorized Actes fDuderrt detors )
ae ee
rabworu (Mesos 3 Thfeeting [7 vesouriees with Nolan
alloising attacked +0 Compyomisg
oyster grea dara ancl do dauare. They also
includ & — sanson art _ALtAOKS « ms
eer ince Cerone roerrenrenees Teacher's Signature
Vusnenabisitics Eiplaits and ftttaona 8— Exploiting yednerablli Hes i| cofmoane sel In “fa organization fo.gan _unastherizedl queens /
J
COMPTOM'ge ar Subotd9e Sysleny- ——
een “ Poulsient Attoors 2 “Tine om Conpler put Laqorurl
thieots, ustich include mutase fe OHA
bet cudo etka types-
a
| na network attack, anakes are foased on
peusrating I corporate nendors petimaer and Ganiog
accers to mkema systeis- Yory often , once Insite
akacken Ul Combine other types ef attacks, sor
ee Cass prerttsng) On endpoint , Spreading Mal oarn
or _enpliting a Valu obit Ina Spe volthin AL
quwor R-“rots af.
tot 1s Cyptegraghy 2 Eipfom coh ire Typed
“[Hovolue yaing compler — Madhentatica
eu AUR Cr tg encom ity o 0 fore kro
Re cipher took 1S encrypt re
[Ricerspticon kee
ron nota new ned concep = Soph histheasech ME » of
ntwus far Sever eudlennia- for
—~ 1} dase ealsteol tn
sed cling infortation > n to 6 cect it Od pres
al goritht
can't be | reach
FP gphtaticard wettede of Nay nfire
vadous — dultwus
brome, crypto
back Fo anclert
rpss Methelh Con be tracked
| eee
tans ane “Phen use Gf At eno ety pries ty _proted=
Cacreol text.
raphy 2 eae
y Syeimtetrie. ography §— [HS also Known as Cecret
Key encryption 1 uses ashe
for the eohole proc. “Thu sender ond vecleven Lye the
keg J
pt ond decrypt a Menage nos to
(a4 fp
prsteck pmeaning ti Key hag
“fo be Securuy Chas eof ops Hem.
1 Cryptography 8— Alan called Public key ceyphagrys
1S often Conslcled eal A Seow.
seeeietenengtoegxperiment NO-«
| one to _encry
| rae ea Information “and fis Indegring «Arner
Be
ft SEE GOA deteypr data Baik eg as Telared= go no
PA one the ofan do deerypt it~
TES Chpheraphic algerie ued sr peteg,
funetion eneeypts informatie wang the com phex
Mothentatical Ag erithey ant Precduyes « ualgut string of
Chonacters, Cec pea to tra dotq- Thy String is Knoda a4
hosh Vel pusnich Fg Usiqut for eath menaee + Ber 74
sig tear Changs ¢y TH 0 par Wot Feautttn Anyone
wolut +
Que-4
Define Authentication and its types fn_nenoare Security 2
Authentication Ic fhe poo 0} verifigng Ae “Wetity Qf & L401 or inforteaten.
User authentication $s th proms of volfying Kt ideaiiy gf a wer
whan thar wer fo9) into a computer Sate.
TRaw aippoutt types 4 quathent cat agvien uch ay g—
aa
Singlt Factor Authentication s- [tudes th fish Heed of ceouity Hat wes
qfevetoped on TNS authentioatin system ,
Rx user hos to ent Ah wyenneerrared TH paydend te confi ubethir
rat user 16 Aosging or Not: Aoi f FH Ldtrname or pondrel
|_ is covery » hen fh usr WI ot be allowed to login er _accen iA
Teacher's Signature .......Experiment Ni
Objective
eat
Oureesrterte
Date «0+.
“Tero factor authentication $- Paths aushenti cater syaten, $c wer hos to
Gea Uaewnens , poricdore cad often fortes,
| Tae an varlon typ of 2{ _Quilertfeadt on Ayden fRat-au umd b4 1H
tasur_fir Seunloy He gygien « Sime of ten ore _ pire toners ead
virtual PREU-, OTP and more.
cy
Huts factor Audherticatin Thats tye. custherfitaton , mort Hen ont
pacer 4 cuutherttaren i neice d: THis gives
besten. Cewuity toh users ey bs te of kexteggen_or phishing ebook.
will not be TPasib Mull focker Authertitaten gatem. Teg
Ouwus The ann, That tet Infertation wile rol Get-stoten
Quis
Define Des algorithms
fre them -
|
DES stands for_Dala_frersptien Stendard. Thuwau certain
Madints phatton be Udtel to crack ta DES algeritha. The
DES _alyorth as a _Key Bf 50 bitsiee + Wseng this tee
Fe 06S taka a Block of 64 bik pln tect a tnput Qnd
Geriratts 4 bbocis af bit cipher tect
“he pes procs has several shep¢ tavelocdl in it, Whur
each step ts cabltd a oun al Depending ie the sla gy Be
Key aed , the nwnben ef veurds varyes « for exan
a 2% bit I< —ccequires |b round La 132 4h key
wequrty jr. rounds and 40 on.
Teacher's Signature .....